IOC Report
ePAY-Advice_Rf[UC7749879100].exe

loading gif

Files

File Path
Type
Category
Malicious
ePAY-Advice_Rf[UC7749879100].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Kontos.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsp7072.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\5D4ACB\B73EF6.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3425316567-2969588382-3778222414-1001\1b1d0082738e9f9011266f86ab9723d2_11389406-0377-47ed-98c7-d564e683c6eb
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\AEGISIIIRadeonHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Fatalismen.Int
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Provokations.Fje
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\avatar-default-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\be.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\changes-allow-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\dotnet.api
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\ebook-reader.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\emblem-photos-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\font-select-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\network-wired-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\pan-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\printer-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\pt-br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\omfartsvejene\Reberbanernes\Muhamedaneres\Sminknings\LogoCanary.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
malicious
C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
C:\Users\user\Desktop\ePAY-Advice_Rf[UC7749879100].exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 2000

URLs

Name
IP
Malicious
https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sear&
unknown
malicious
https://zed-unusual-activity-com.veldaeffertz.ml/z
unknown
malicious
http://171.22.30.147/flowe/five/fre.php
171.22.30.147
malicious
https://zed-unusual-activity-com.veldaeffertz.ml/
unknown
malicious
https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea
188.114.96.3
malicious
https://zed-unusual-activity-com.veldaeffertz.ml/0
unknown
malicious
https://zed-unusual-activity-com.veldaeffertz.ml/P
unknown
malicious
https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea-T
unknown
malicious
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
zed-unusual-activity-com.veldaeffertz.ml
188.114.96.3

IPs

IP
Domain
Country
Malicious
171.22.30.147
unknown
Germany
malicious
188.114.96.3
zed-unusual-activity-com.veldaeffertz.ml
European Union

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Shabbyish\Retablerings
Aphetism

Memdumps

Base Address
Regiontype
Protect
Malicious
3DE8000
direct allocation
page execute and read and write
malicious
400000
unkown
page readonly
6B3000
heap
page read and write
436000
unkown
page readonly
1F2BCF40000
heap
page read and write
3510F000
stack
page read and write
1F2BD113000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
5060000
remote allocation
page read and write
5E0000
heap
page read and write
28D1000
heap
page read and write
5351000
heap
page read and write
1F2BD100000
heap
page read and write
429000
unkown
page read and write
6B3000
heap
page read and write
349E0000
direct allocation
page read and write
6B3000
heap
page read and write
3240000
heap
page read and write
409000
unkown
page write copy
4C0000
heap
page read and write
6B3000
heap
page read and write
1F2BCC10000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
436000
unkown
page readonly
28D6000
heap
page read and write
3F18000
remote allocation
page execute and read and write
2B18000
remote allocation
page execute and read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
34D7D000
stack
page read and write
1F2BD100000
heap
page read and write
1F2BCD80000
trusted library allocation
page read and write
6B3000
heap
page read and write
5EA000
unkown
page execute read
51A0000
heap
page read and write
350CE000
stack
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
5258000
heap
page read and write
28DE000
heap
page read and write
520D000
heap
page read and write
5E8000
unkown
page execute read
30000
heap
page read and write
529B000
heap
page read and write
34CBE000
stack
page read and write
525F000
heap
page read and write
433000
unkown
page read and write
79000
heap
page read and write
1F2BCE13000
unkown
page read and write
6B3000
heap
page read and write
28DC000
heap
page read and write
6DA25000
unkown
page readonly
522F000
heap
page read and write
401000
unkown
page execute read
1F2BD002000
heap
page read and write
34CFF000
stack
page read and write
400000
unkown
page readonly
20000
unclassified section
page readonly
70000
trusted library allocation
page read and write
4C5000
heap
page read and write
1F2BD113000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
5296000
heap
page read and write
51A8000
heap
page read and write
6B3000
heap
page read and write
34C7F000
stack
page read and write
6B3000
heap
page read and write
2330000
heap
page read and write
6B3000
heap
page read and write
401000
unkown
page execute read
6B3000
heap
page read and write
6C10000
trusted library allocation
page read and write
27BF000
stack
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
2375000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
5299000
heap
page read and write
34E50000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
52DF000
stack
page read and write
6B3000
heap
page read and write
28D7000
heap
page read and write
6B3000
heap
page read and write
1D0000
unclassified section
page readonly
1F2BCE2A000
heap
page read and write
5224000
heap
page read and write
6B3000
heap
page read and write
3330000
trusted library allocation
page read and write
6B3000
heap
page read and write
6C10000
trusted library allocation
page read and write
6A2000
heap
page read and write
5204000
heap
page read and write
60000
direct allocation
page read and write
6B3000
heap
page read and write
5136000
direct allocation
page read and write
6B3000
heap
page read and write
6DA20000
unkown
page readonly
5490000
direct allocation
page read and write
6C10000
trusted library allocation
page read and write
51E8000
direct allocation
page execute and read and write
6B3000
heap
page read and write
401000
unkown
page execute read
6B3000
heap
page read and write
5040000
heap
page read and write
509E000
stack
page read and write
6B3000
heap
page read and write
28D3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
1F2BCF15000
trusted library allocation
page read and write
6B3000
heap
page read and write
34860000
heap
page read and write
5351000
heap
page read and write
3330000
trusted library allocation
page read and write
6B3000
heap
page read and write
3524F000
stack
page read and write
65E8000
direct allocation
page execute and read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
1F2BCF00000
trusted library allocation
page read and write
6B3000
heap
page read and write
71000
heap
page read and write
436000
unkown
page readonly
34880000
direct allocation
page read and write
70000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
2260000
heap
page read and write
225E000
stack
page read and write
3518000
remote allocation
page execute and read and write
1F2BCE10000
unkown
page read and write
5BE8000
direct allocation
page execute and read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
5255000
heap
page read and write
6B3000
heap
page read and write
2214000
heap
page read and write
34F0E000
stack
page read and write
43F000
unkown
page readonly
6B3000
heap
page read and write
5210000
heap
page read and write
28DE000
heap
page read and write
5060000
remote allocation
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
513A000
direct allocation
page read and write
5EE000
unkown
page execute read
349A0000
direct allocation
page read and write
2370000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6C99000
trusted library allocation
page read and write
28D6000
heap
page read and write
28DC000
heap
page read and write
4918000
remote allocation
page execute and read and write
3330000
trusted library allocation
page read and write
34C3E000
stack
page read and write
5350000
heap
page read and write
6B3000
heap
page read and write
43A000
unkown
page readonly
28D3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
524F000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
20000
unclassified section
page readonly
1F2BD013000
heap
page read and write
3508D000
stack
page read and write
511E000
stack
page read and write
1660000
remote allocation
page execute and read and write
2118000
remote allocation
page execute and read and write
48E000
stack
page read and write
5B85879000
stack
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
3330000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
170000
direct allocation
page read and write
5B850FD000
stack
page read and write
1F2BCC80000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
1F2BD102000
heap
page read and write
1718000
remote allocation
page execute and read and write
5045000
heap
page read and write
47E8000
direct allocation
page execute and read and write
2210000
heap
page read and write
19A000
stack
page read and write
6B3000
heap
page read and write
5F0000
unkown
page execute read
699000
heap
page read and write
5EC000
unkown
page execute read
6B3000
heap
page read and write
649000
unkown
page execute read
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
407000
unkown
page readonly
6B3000
heap
page read and write
6B3000
heap
page read and write
1F2BD000000
heap
page read and write
34D3E000
stack
page read and write
34E3F000
stack
page read and write
1F2BD102000
heap
page read and write
407000
unkown
page readonly
96000
stack
page read and write
525F000
heap
page read and write
5224000
heap
page read and write
6B3000
heap
page read and write
5217000
heap
page read and write
407000
unkown
page readonly
6B3000
heap
page read and write
34DFE000
stack
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
1F2BCE48000
heap
page read and write
3200000
heap
page read and write
6B3000
heap
page read and write
5219000
heap
page read and write
1F2BCE02000
unkown
page read and write
28DA000
heap
page read and write
421000
unkown
page read and write
531C000
stack
page read and write
180000
direct allocation
page read and write
6B3000
heap
page read and write
6C60000
trusted library allocation
page read and write
50DF000
stack
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
6B3000
heap
page read and write
30000
heap
page read and write
409000
unkown
page read and write
43F000
unkown
page readonly
43F000
unkown
page readonly
6B3000
heap
page read and write
85F000
stack
page read and write
34F4D000
stack
page read and write
5130000
direct allocation
page read and write
6B3000
heap
page read and write
54A0000
heap
page read and write
43A000
unkown
page readonly
5217000
heap
page read and write
6DA21000
unkown
page execute read
1D0000
unclassified section
page readonly
400000
unkown
page readonly
6B3000
heap
page read and write
6B3000
heap
page read and write
43A000
unkown
page readonly
6B3000
heap
page read and write
3514E000
stack
page read and write
6B3000
heap
page read and write
668000
heap
page read and write
6B3000
heap
page read and write
409000
unkown
page write copy
5255000
heap
page read and write
5044000
heap
page read and write
424000
unkown
page read and write
524F000
heap
page read and write
3330000
trusted library allocation
page read and write
5B854FE000
stack
page read and write
6C99000
trusted library allocation
page read and write
5150000
heap
page read and write
626000
unkown
page execute read
33E8000
direct allocation
page execute and read and write
5F2000
unkown
page execute read
6B3000
heap
page read and write
170000
direct allocation
page read and write
6B3000
heap
page read and write
6DA23000
unkown
page readonly
6B3000
heap
page read and write
3330000
direct allocation
page execute and read and write
6B3000
heap
page read and write
5299000
heap
page read and write
1F2BCF02000
trusted library allocation
page read and write
660000
heap
page read and write
1F2BCE00000
unkown
page read and write
28D4000
heap
page read and write
401000
unkown
page execute read
522F000
heap
page read and write
6B3000
heap
page read and write
1F2BCE23000
unkown
page read and write
5060000
remote allocation
page read and write
There are 290 hidden memdumps, click here to show them.